beautypg.com

Using the microphone, Wireless communications, Using the microphone -6 wireless communications -6 – Toshiba NB100 User Manual

Page 50: Wireless lan

background image

4-6

User’s Manual

NB 100 Series

Using the microphone

You can use the built-in or an external microphone that connects to the

microphone jack to record monaural sounds into your applications. It can

also be used to issue voice commands to applications that support such

functions.(Built-in microphone is provided with some models)
Since your computer has a microphone and speaker, “feedback” may be

heard under certain conditions. Feedback occurs when sound from the

speaker is picked up in the microphone and amplified back to the speaker,

which amplifies it again to the microphone.
This feedback occurs repeatedly and causes a very loud, high-pitched

noise. It is a common phenomenon that occurs in any sound system when

the microphone input is output to the speaker (throughput) and the speaker

volume is too loud or too close to the microphone. You can control

throughput by adjusting the volume of your speaker or through the Mute

function in the Master Volume panel. Refer to your Windows documentation

for details on using the Master Volume panel.

Wireless communications

The computer’s wireless communication function supports both Wireless

LAN and Bluetooth devices.

Wireless LAN

The Wireless LAN is compatible with other LAN systems based on Direct

Sequence Spread Spectrum/Orthogonal Frequency Division Multiplexing

radio technology that complies with IEEE 802.11 wireless LAN standard

(Revision B and G).
Supported features. It supports the following features:

Automatic Transmit Rate Select mechanism in the transmit range of 54,

48, 36, 24, 18, 9 and 6 Mbit/s (Revision G).

Automatic Transmit Rate Select mechanism in the transmit range of 11,

5.5, 2 and 1 Mbit/s (Revision B).

Frequency Channel Selection (Revision B/G: 2.4GHz)

Roaming over multiple channels

Card Power Management

Wired Equivalent Privacy (WEP) data encryption, based on the 128 bit

encryption algorithm (Atheros module type).

Security

Be sure to enable encryption function. Otherwise your computer will

allow the illegal access by outsider through wireless LAN to cause

illegal instruction, eavesdropping, and loss or destruction of stored data.

TOSHIBA strongly recommends the customer to enable the encryption

function.